Application Security and Development Security Technical Implementation Guide
Rules, Groups, and Values defined within the XCCDF Benchmark
-
The application must implement replay-resistant authentication mechanisms for network access to privileged accounts.
<VulnDiscussion>A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authen...Rule Medium Severity -
The application must use multifactor (e.g., CAC, Alt. Token) authentication for network access to non-privileged accounts.
<VulnDiscussion>To assure accountability and prevent unauthenticated access, non-privileged users must utilize multifactor authentication to ...Rule Medium Severity -
SRG-APP-000151
<GroupDescription></GroupDescription>Group -
The application must use multifactor (Alt. Token) authentication for local access to privileged accounts.
<VulnDiscussion>Multifactor authentication (MFA) requires using two or more factors to achieve authentication and access. Factors include: (...Rule Medium Severity -
SRG-APP-000152
<GroupDescription></GroupDescription>Group -
The application must use multifactor (e.g., CAC, Alt. Token) authentication for local access to nonprivileged accounts.
<VulnDiscussion>To assure accountability, prevent unauthenticated access, and prevent misuse of the system, privileged users must utilize mul...Rule Medium Severity -
SRG-APP-000153
<GroupDescription></GroupDescription>Group -
The application must ensure users are authenticated with an individual authenticator prior to using a group authenticator.
<VulnDiscussion>To ensure individual accountability and prevent unauthorized access, application users must be individually identified and au...Rule Medium Severity -
SRG-APP-000156
<GroupDescription></GroupDescription>Group -
SRG-APP-000157
<GroupDescription></GroupDescription>Group -
The application must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.
<VulnDiscussion>A replay attack is a man-in-the-middle style attack which allows an attacker to repeat or alter a valid data transmission tha...Rule Medium Severity -
SRG-APP-000158
<GroupDescription></GroupDescription>Group -
The application must utilize mutual authentication when endpoint device non-repudiation protections are required by DoD policy or by the data owner.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. Wit...Rule Medium Severity -
SRG-APP-000394
<GroupDescription></GroupDescription>Group -
The application must authenticate all network connected endpoint devices before establishing any connection.
<VulnDiscussion>Without authenticating devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. ...Rule Medium Severity -
SRG-APP-000395
<GroupDescription></GroupDescription>Group -
Service-Oriented Applications handling non-releasable data must authenticate endpoint devices via mutual SSL/TLS.
<VulnDiscussion>Without identifying devices, unidentified or unknown devices may be introduced, thereby facilitating malicious activity. One...Rule Medium Severity -
SRG-APP-000163
<GroupDescription></GroupDescription>Group -
SRG-APP-000169
<GroupDescription></GroupDescription>Group -
The application must disable device identifiers after 35 days of inactivity unless a cryptographic certificate is used for authentication.
<VulnDiscussion>Device identifiers are used to identify hardware devices that interact with the application much like a user account is used ...Rule Medium Severity
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.